PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs
|
|
- Dorothy Lawson
- 5 years ago
- Views:
Transcription
1 WiNGS Labs PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs * Nokia Research Center, Palo Alto Shravan Rayanchu, Suman Banerjee University of Wisconsin-Madison Konstantina Papagiannaki Intel Labs, Pittsburgh *vivek.2.shrivastava@nokia.com NSDI
2 Enterprise WLAN setting Clients Internet Access Point Wireless controller NSDI
3 Enterprise WLAN setting Clients Functionalities implemented at controller Intrusion detection system Interference management Internet (channel assignment, power control) Access Point Wireless controller NSDI
4 Enterprise WLAN setting Clients Functionalities implemented at controller Intrusion detection system Interference management Internet (channel assignment, power control) Access Point Wireless controller NSDI
5 Problems with wireless* The wireless is being flaky. Flaky how? Well my connection dropped earlier and now it seems to be slow We will take a look. User Wait, now it seems fine. Support *Slide borrowed from Cheng et. al (Jigsaw, Sigcomm 06) NSDI
6 Problems with wireless Hidden terminals 6 6 NSDI
7 Problems with wireless Rate anomaly 6 Mbps 54 Mbps Mismatch in data rates, slows down fast links NSDI
8 Problems with wireless Increasing client density and mobility. 8 8 NSDI
9 Problems with wireless Increasing client density and mobility. 9 9 NSDI
10 Problems with wireless. changing interference patterns NSDI
11 Interference management in WLANs NSDI
12 Interference management in WLANs Estimate Interference dynamically Manage Interference (data scheduling, transmit power control, channel assignment) NSDI
13 Interference management in WLANs Estimate Interference dynamically Manage Interference (data scheduling, transmit power control, channel assignment) NSDI
14 How to estimate interference? Use bandwidth tests NSDI
15 How to estimate interference? AP-Client Use bandwidth tests pair Interferer NSDI
16 How to estimate interference? 1) Measure AP-Client delivery in isolation NSDI
17 How to estimate interference? 1) Measure AP-Client Isolation delivery in isolation delivery= 0.95 NSDI
18 How to estimate interference? 1) Measure AP-Client delivery in isolation 2) Activate interferer and measure delivery NSDI
19 How to estimate interference? 1) Measure AP-Client Interference delivery= 0.66 delivery in isolation 2) Activate interferer and measure delivery NSDI
20 How to estimate interference? 1) Measure AP-Client delivery in isolation 2) Activate interferer and measure delivery Link Interference Ratio (LIR) = del Interference / del isolation NSDI
21 How to estimate interference? 1) Measure AP-Client delivery in isolation 2) Activate interferer and measure delivery Link Interference Ratio (LIR) = 0.66 / 0.95 = 0.69 NSDI
22 How to estimate interference? 1) Measure AP-Client delivery in isolation 2) Activate interferer and measure delivery 0 LIR 1 Strong Weak NSDI
23 But are bandwidth tests practical? Can we use bandwidth tests in live settings Good accuracy Network downtime required - X Not scalable (~ 1 hr for 20 AP-Client pair network) - X Not based on realistic rates and packet sizes X Inefficient in dynamic scenario (client mobility) X NSDI
24 But are bandwidth tests practical? Can we use bandwidth tests in live settings Good accuracy Network downtime required - X Not scalable (~ 1 hr for 20 AP-Client pair network) - X Not based on realistic rates and packet sizes X Inefficient in dynamic scenario (client mobility) X Can we estimate interference in a passive, real-time way? NSDI
25 PIE Outline Motivation Conventional bandwidth tests not sufficient Passive Interference Estimation (PIE) Polling period of PIE Accuracy of PIE Realistic trace replay with PIE Applications of PIE Summary NSDI
26 Estimating interference passively Sniffer Sniffer NSDI
27 Estimating interference passively Sniffer could be a dedicated wireless radio Clocks synchronized using wired backplane Sniffer Sniffer NSDI
28 Estimating interference passively Sniffer reports NSDI
29 Estimating interference passively Sniffer reports Timestamp, duration, rate, success.. NSDI
30 Estimating interference passively Hidden terminals NSDI
31 Estimating interference passively Hidden terminals NSDI
32 Estimating interference passively Hidden terminals NSDI
33 Estimating interference passively Hidden terminals 1. Carrier sense NSDI
34 Estimating interference passively 1) Note timestamp, Hidden terminals rate, duration 2. Channel free, transmit NSDI
35 Estimating interference passively 1) Note timestamp, rate, duration 2) Note if transmission is a success (ack received?) 3. Collision! NSDI
36 Estimating interference passively Timestamp: T0 Rate: 6Mbps Length: 1400 bytes Success: False Timestamp: T0 + δ Rate: 12Mbps Length: 600 bytes Success: False NSDI
37 Estimating interference passively T0 6Mbps 1400 bytes False T0 + δ 12Mbps 600 bytes False Interference estimation NSDI
38 Estimating interference passively T0 6Mbps 1400 bytes False T0 + δ 12Mbps 600 bytes False NSDI
39 Estimating interference passively T0 6Mbps 1400 bytes False T0 + δ 12Mbps 600 bytes False NSDI
40 Estimating interference passively T0 6Mbps 1400 bytes False T0 + δ 12Mbps 600 bytes False & NSDI
41 Estimating interference passively Red & T0 6Mbps 1400 bytes False T0 + δ 12Mbps 600 bytes False & Green clients interfere NSDI
42 Estimating interference passively Infer interference Sniffer reports cenarios eception X X X X NSDI
43 Estimating interference passively Infer interference Sniffer reports cenarios eception X X X X Red and Green packets overlaps => both lost NSDI
44 Estimating interference passively Infer interference Sniffer reports cenarios eception X X X X No overlap, no problem! NSDI
45 Estimating interference passively Infer interference Sniffer reports cenarios eception X X X X Both way hidden terminals NSDI
46 Estimating interference passively Infer interference Sniffer reports cenarios eception X X NSDI
47 Estimating interference passively Infer interference Sniffer reports cenarios eception X X Red and Green packets overlaps => Green is lost 47
48 Estimating interference passively Infer interference Sniffer reports cenarios eception X X One way hidden terminals NSDI
49 Computing interference measure in PIE Compute Isolation loss rate Fraction of non-overlapping packets lost Compute Interference loss rate Fraction of overlapping packets lost Interference measure (LIR): (1 Interference loss) / (1 Isolation loss ) NSDI
50 How quickly can PIE converge? Time taken by PIE to converge depends on two key properties Periodicity with which sniffer reports are collected by the controller Traffic patterns for the links which dictate the number of interference events captured in a time interval NSDI
51 How quickly can PIE converge? Time taken by PIE to converge depends on two key properties Periodicity with which sniffer reports are collected by the controller What is the minimum polling period? Traffic patterns for the links which dictate the number of interference events captured in a time interval How much time does PIE take under realistic access patterns? NSDI
52 PIE Outline Motivation Conventional bandwidth tests not sufficient Passive Interference Estimation (PIE) Polling period of PIE Accuracy of PIE Realistic trace replay with PIE Applications of PIE Summary NSDI
53 What is the minimum polling period? P P P time interval I 1 I 2 Time NSDI
54 What is the minimum polling period? P P P time interval I 1 I 2 Time R(I 1 ) R(I 1 ) NSDI
55 What is the minimum polling period? P P P time interval I 1 I 2 Time R(I 1 ) R(I 1 ) LIR (I 1 ) NSDI
56 What is the minimum polling period? P P P time interval I 1 I 2 Time R(I 2 ) R(I 2 ) LIR (I 1 ) NSDI
57 What is the minimum polling period? P P P time interval I 1 I 2 Time LIR (I 1 ) R(I 2 ) R(I 2 ) LIR (I 2 ). NSDI
58 LIR What is the minimum polling period? Polling period (ms) Stability of interference measure for saturated traffic NSDI
59 LIR What is the minimum polling period? Measure stabilizes after ~85 ms (at least 20 overlap samples) Polling period (ms) Stability of interference measure per polling period NSDI
60 LIR What is the minimum polling period? We use a polling period of 100ms Polling period (ms) Stability of interference measure per polling period NSDI
61 PIE Outline Motivation Conventional bandwidth tests not sufficient Passive Interference Estimation (PIE) Polling period of PIE Accuracy of PIE Realistic trace replay with PIE Applications of PIE Summary NSDI
62 % of link-interferer pairs How accurate is PIE? Mean Error in LIR estimation 62 62
63 % of link-interferer pairs How accurate is PIE? Mean Error in LIR estimation 63 63
64 % of link-interferer pairs How accurate is PIE? 95% of link-interferer pairs, LIR computed by PIE is within +/- 0.1 of the value reported by BW test Mean Error in LIR estimation 64 64
65 PIE Outline Motivation Conventional bandwidth tests not sufficient Passive Interference Estimation (PIE) Polling period of PIE Accuracy of PIE Realistic trace replay with PIE Applications of PIE Summary NSDI
66 PIE with realistic access patterns NSDI
67 PIE with realistic access patterns Evaluate PIE using realist traffic patterns on a 15 node topology (7 AP 8 laptops) Each client laptop replays the traffic patterns of an actual client from a real wireless trace Three activity periods: heavy (> 40 % medium busy), medium (40 20% busy), light (< 20% busy) NSDI
68 Time to estimate (ms) PIE with realistic access patterns Heavy Medium Light Traffic period NSDI
69 Time to estimate (ms) PIE with realistic access patterns Convergence is faster for higher client activity 0 Even for light activity, Heavy median Medium time of estimate Light LIR is less than 650 ms Traffic period NSDI
70 PIE Outline Motivation Conventional bandwidth tests not sufficient Passive Interference Estimation (PIE) Polling period of PIE Accuracy of PIE Realistic trace replay with PIE Applications of PIE Summary NSDI
71 What is the impact on WLAN applications? AP-Client pairs NSDI
72 What is the impact on WLAN applications? AP-Client pairs Evaluate usefulness of PIE for an interference mitigation mechanism (data scheduling using CENTAUR Mobicom 09) NSDI
73 What is the impact on WLAN applications? AP-Client pairs 1. Estimate interference using PIE NSDI
74 What is the impact on WLAN applications? AP-Client pairs 1. Estimate interference using PIE 2. Input estimate to a centralized data scheduler NSDI
75 What is the impact on WLAN applications? AP-Client pairs 1. Estimate interference using PIE 2. Input estimate to a centralized data scheduler 3. Evaluate performance under dynamic scenarios NSDI
76 System Throughput (Mbps) What is the impact on end users? Static Static scenario NSDI
77 System Throughput (Mbps) What is the impact on end users? Static Static scenario NSDI
78 System Throughput (Mbps) What is the impact on end users? Static scenarios, PIE is comparable to BW test Static Static scenario NSDI
79 System Throughput (Mbps) What is the impact on end users? Mobile Mobile scenario NSDI
80 System Throughput (Mbps) What is the impact on end users? Mobile Mobile scenario NSDI
81 System Throughput (Mbps) What is the impact on end users? Mobility scenarios, PIE outperforms BW test Mobile Mobile scenario NSDI
82 What is the impact on end users? PIE can also be used to monitor production systems (like Jigsaw) We monitored two production WLANs Use testbed nodes in proximity of production APs as sniffers Identify hidden terminals and rate anomaly problems NSDI
83 What is the impact on end users? WLANs Hidden terminal cases (LIR < 0.7) Rate anomaly cases (Ratio of rates < 0.2) WLAN1 8% 21% WLAN2 11% 22% NSDI
84 What is the impact on end users? WLANs Hidden terminal cases (LIR < 0.7) Rate anomaly cases (Ratio of rates < 0.2) WLAN1 8% 21% WLAN2 11% 22% Hidden terminals are rare, but can become pain points for clients Rate anomaly is more frequent, but do not cause drastic performance issues NSDI
85 PIE Outline Motivation Conventional bandwidth tests not sufficient Passive Interference Estimation (PIE) Polling period of PIE Accuracy of PIE Realistic trace replay with PIE Applications of PIE Summary NSDI
86 Related Work PIE leverages techniques from Jigsaw, WIT (Sigcomm 2006) and builds on their ideas Focus of Jigsaw, WIT was to understand interference, ours is to compute it in real-time CMAP also infers interference to harness exposed terminals, but requires physical layer change Active techniques like Microprobing (CoNext 2008) still require downtime and do not use realistic traffic NSDI
87 PIE Limitations Does not handle non-wifi interferer like microwaves. Can miss external interferers if none of the enterprise APs can listen to the interferer May miss client conflicts, can use client participation in PIE to enhance the system Interference detection techniques at the physical layer may be more accurate in some scenarios where diversity is too low for PIE to function NSDI
88 PIE Summary Online interference estimation important for interference mitigation BW test incurs high overhead, requires downtime PIE is a passive mechanism, generates interference estimates in real time Leverages centralized infrastructure to collect real time reports from APs Non-intrusive with good accuracy NSDI
89 Thank you! NSDI
Diagnosing Wireless Packet Losses in : Collision or Weak Signal?
Diagnosing Wireless Packet Losses in 802.11: Collision or Weak Signal? Shravan Rayanchu Arunesh Mishra Dheeraj Agrawal Sharad Saha Suman Banerjee Wisconsin Wireless and NetworkinG Systems (WiNGS) Lab University
More informationCommon problems in production Wireless Networks. Jigsaw: Solving the Puzzle of Enterprise Analysis. Sounds Familiar?
Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis Written by Yu-Chung Cheng, John Bellardo, Peter Benko, Alex C. Snoeren, Geoffrey M. Voelker and Stefan Savage Analysis by Carlos Troncoso CS388
More informationLecture 17: Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
More informationPage 1. Overview : Wireless Networks Lecture 15: WiFi Self-Organization. Client throughput. What determines client performance?
Overview 18-759: Wireless Networks Lecture 15: WiFi Self-Organization Dina Papagiannaki & Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2009 http://www.cs.cmu.edu/~prs/wireless09/
More informationObserving Home Wireless Experience through WiFi APs
Observing Home Wireless Experience through WiFi APs Ashish Patro* Srinivas Govindan Prof. Suman Banerjee University of Wisconsin Madison *patro@cs.wisc.edu Dense residenfal WLANs today Apartment Building
More informationConcurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs
Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign
More informationOPTIMIZING ENTERPRISE WIRELESS NETWORKS THROUGH CENTRALIZATION. Vivek Vishal Shrivastava
OPTIMIZING ENTERPRISE WIRELESS NETWORKS THROUGH CENTRALIZATION by Vivek Vishal Shrivastava A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Computer
More informationA Measurement Study of a Commercial-grade Urban WiFi Mesh
A Measurement Study of a Commercial-grade Urban WiFi Mesh Vladimir Brik Shravan Rayanchu Sharad Saha Sayandeep Sen Vivek Shrivastava Suman Banerjee Wisconsin Wireless and NetworkinG Systems (WiNGS) Lab
More informationComputer Communication III
Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost
More informationWireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1
Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices
More informationMeasurements in the wireless
Contents Measurements in the wireless Lecture slides for S-38.3183 6.4.2006 Mika Ilvesmäki Motivation Wireless environment spesifics Wireless trace collection Wireless measurement methods Mobility measurements
More informationWi-Fi Activity in Open Environments: Tools, Measurements, and Analyses. Thomas Claveirole Ph.D. Defense February 26, 2010
Wi-Fi Activity in Open Environments: Tools, Measurements, and Analyses Thomas Claveirole Ph.D. Defense February 26, 2010 Ana Cavalli Reviewer Prof. TÉLÉCOM & Management SudParis Thierry Turletti Reviewer
More informationDetecting Protected Layer-3 Rogue APs
Detecting Protected Layer-3 Rogue APs Authors: Hongda Yin, Guanling Chen, and Jie Wang Department of Computer Science, University of Massachusetts Lowell Presenter: Bo Yan Department of Computer Science
More informationWireless Networks (MAC)
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationMobile Communications Chapter 7: Wireless LANs
Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.
More informationWireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica
802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf
More informationA Passive Approach to Wireless NIC Identification
A Passive Approach to Wireless NIC Identification Cherita Corbett Georgia Institute of Technology IEEE ICC 2006 June 13, 2006 Presentation Outline Motivation & Background Objective NIC Identification using
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationRhythm: Achieving Scheduled WiFi Using Purely Distributed Contention in WLANs
Rhythm: Achieving Scheduled WiFi Using Purely Distributed Contention in WLANs Chao-Fang Shih, Bhuvana Krishnaswamy, and Raghupathy Sivakumar Georgia Institute of Technology, Atlanta, GA, USA {cshih,bhuvana,siva}@ece.gatech.edu
More informationWireless Router at Home
Wireless Router at Home 192.168.1.2 192.168.1.1 Modem 192.168.1.3 120.6.46.15 telephone line to ISP 192.168.1.4 Internet connection with public IP internal LAN with private IPs 192.168.1.5 Wireless All-in-one
More informationWireless Local Area Networks. Networks: Wireless LANs 1
Wireless Local Area Networks Networks: Wireless LANs 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices (PDAs and cell phones) created an obvious application
More informationLAB PROJECT Nº1 1 INTRODUCTION REDES MÓVEIS E SEM FIOS , MEEC PERFORMANCE OF WIRELESS PERSONAL AREA NETWORKS
LAB PROJECT Nº1 REDES MÓVEIS E SEM PERFORMANCE OF WIRELESS PERSONAL AREA NETWORKS 1 INTRODUCTION The performance of wireless networks is highly dependent of physical phenomena, such as path loss, shadowing,
More informationLecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy
Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision
More informationNetworked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang
Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application Ling Wang ling.wang2@wayne.edu Outline Introduction Parameterization Differentiation Evaluation
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationA Value Aware Approach for Wireless Media Delivery
A Value Aware Approach for Wireless Media Delivery Sayandeep Sen Neel Kamal Madabhushi Suman Banerjee University of Wisconsin-Madison Outline Motivation Case Study: Value aware MAC Value aware MAC design
More informationMAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users
MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationCutting the Cord: A Robust Wireless Facilities Network for Data Centers
Cutting the Cord: A Robust Wireless Facilities Network for Data Centers Yibo Zhu, Xia Zhou, Zengbin Zhang, Lin Zhou, Amin Vahdat, Ben Y. Zhao and Haitao Zheng U.C. Santa Barbara, Dartmouth College, U.C.
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationMultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card IEEE INFOCOM 2004
MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card IEEE INFOCOM 2004 Outline INTRODUCTION MOTIVATING SCENARIOS AND BACKGROUND THE MULTINET APPROACH IMPLEMENTATION AND SYSTEM
More informationstandard. Acknowledgement: Slides borrowed from Richard Y. Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to
More informationLink Estimation and Tree Routing
Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationGranting Silence to Avoid Wireless Collisions
Granting Silence to Avoid Wireless Collisions Jung Il Choi, Mayank Jain, Maria A. Kazandjieva, and Philip Levis October 6, 2010 ICNP 2010 Wireless Mesh and CSMA One UDP flow along a static 4-hop route
More informationExperimental Evaluation of Large Scale WiFi Multicast Rate Control
Experimental Evaluation of Large Scale WiFi Multicast Rate Control Varun Gupta*, Craig Gutterman*, Gil Zussman*, Yigal Bejeranoº *Electrical Engineering, Columbia University ºBell Labs, Nokia Objective
More informationWireless Communication and Networking CMPT 371
Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop
More informationWireless LAN -Architecture
Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationLecture 16: QoS and "
Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture
More informationAn In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance
An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance Authors: Junxian Huang, Feng Qian, Yihua Guo, Yuanyuan Zhou, Qiang Xu, Z. Morley Mao, Subhabrata Sen, Oliver
More informationWireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs
Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer 1 Wireless Local Area Networks (WLANs) The proliferation of laptop computers and other mobile devices (PDAs and cell phones)
More informationTowards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani
Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani (in collaboration with Ming Li, Devesh Agrawal, Deepak Ganesan, Aruna Balasubramanian, Brian Levine, Xiaozheng Tie at UMass
More informationAuto-configuration of n WLANs
Auto-configuration of 802.11n WLANs Mustafa Y. Arslan - Konstantinos Pelechrinis - Ioannis Broustis UC Riverside University of Pittsburgh UC Riverside Srikanth Krishnamurthy - Sateesh Addepalli - Konstantina
More informationA Measurement Study of Multiplicative Overhead Effects in Wireless Networks
A Measurement Study of Multiplicative Overhead Effects in Wireless Joseph Camp, Vincenzo Mancuso, Omer Gurewitz, and Edward W. Knightly INFOCOM 2008 http://networks.rice.edu System: Large-scale, Multi-tier
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationCOAP: A So)ware- Defined Approach for Home WLAN Management though an Open API. Ashish Patro* Prof. Suman Banerjee
COAP: A So)ware- Defined Approach for Home WLAN Management though an Open API Ashish Patro* Prof Suman Banerjee University of Wisconsin Madison *patro@cswiscedu Ashish Patro / COAP / MobiArch 2014 1 Dense
More informationEthernet. Introduction. CSE 3213 Fall 2011
Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationTMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks
: A TDMA Based Multi-Channel MAC Protocol using a Single Radio Transceiver for Mobile Ad Hoc Networks Jingbin Zhang, Gang Zhou, Chengdu Huang, Ting Yan, Sang H. Son, John A. Stankovic Department of Computer
More information04/11/2011. Wireless LANs. CSE 3213 Fall November Overview
Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access
More informationLXRS and LXRS+ Wireless Sensor Protocol
LORD TECHNICAL NOTE LXRS and LXRS+ Wireless Sensor Protocol Using LXRS and LXRS+ For Long-Term Monitoring and High Bandwidth Test and Measurement Introduction LORD Sensing has developed and deployed two
More informationMohamed Khedr.
Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing
More informationWireless Protocols. Training materials for wireless trainers
Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details
More informationLecture 1 Overview - Data Communications, Data Networks, and the Internet
DATA AND COMPUTER COMMUNICATIONS Lecture 1 Overview - Data Communications, Data Networks, and the Internet Mei Yang Based on Lecture slides by William Stallings 1 OUTLINE Data Communications and Networking
More informationLecture 17: Wireless Networking
Lectre 17: 802.11 Wireless Networking CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Lili Qi, Nitin Vaidya Lectre 17 Overview Project discssion Intro to 802.11 WiFi Jigsaw discssion CSE
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationCutting the Cord: A Robust Wireless Facilities Network for Data Centers
Cutting the Cord: A Robust Wireless Facilities Network for Data Centers Yibo Zhu, Xia Zhou, Zengbin Zhang, Lin Zhou, Amin Vahdat, Ben Y. Zhao and Haitao Zheng U.C. Santa Barbara, Dartmouth College, U.C.
More informationNetwork Simulators, Emulators and Testbeds
Outline Network Simulators, Emulators and Testbeds By: George Nychis Gaurang Sardesai Motivation for Research Different Techniques Simulators Assumptions/Axioms Methods and Results Testbeds Architecture
More informationEnabling TDMA for Today s Wireless LANs
Enabling TDMA for Today s Wireless LANs Zhice Yang 1 *, Jiansong Zhang 2 *, Kun Tan 2, Qian Zhang 1, Yongguang Zhang 2 1 CSE, Hong Kong University of Science and Technology 2 Microsoft Research Asia *
More informationA and C cant see each other, both send to B RTS/CTS can help
Virtual carrier sensing Recita,on 8 Wireless Networks First exchange control frames before transmi@ng data Sender issues Request to Send (RTS), incl. length of data Receiver responds with Clear to Send
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationAutomating Cross-Layer Diagnosis of Enterprise Wireless Networks
Automating Cross-Layer Diagnosis of Enterprise 802.11 Wireless Networks Yu-Chung Cheng Department of Computer Science & Engineering University of California, San Diego 1 Diagnosing distributed systems
More informationAnnouncements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.
Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationOn the Performance Characteristics of WLANs: Revisited
On the Performance Characteristics of WLANs: Revisited S. Choi,, K. Park and C.K. Kim Sigmetrics 2005 Banff, Canada Presenter - Bob Kinicki Advanced Computer Networks Fall 2007 Outline Introduction System
More informationPacket-Level Diversity From Theory to Practice: An based Experimental Investigation
Packet-Level Diversity From Theory to Practice: An 802.11- based Experimental Investigation E. Vergetis, E. Pierce, M. Blanco and R. Guérin University of Pennsylvania Department of Electrical & Systems
More informationAn Energy Efficient MAC for Wireless Full Duplex Networks
An Energy Efficient MAC for Wireless Full Duplex Networks Ryo Murakami, Makoto Kobayashi, Shunsuke Saruwatari and Takashi Watanabe Graduate School of Information Science and Technology, Osaka University,
More informationDepartment of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005
Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 Final: 5/20/2005 There are 10 questions in total. Please write your SID
More informationThere are 10 questions in total. Please write your SID on each page.
Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 to the Final: 5/20/2005 There are 10 questions in total. Please write
More informationPractical MU-MIMO User Selection on ac Commodity Networks
Practical MU-MIMO User Selection on 802.11ac Commodity Networks Sanjib Sur Ioannis Pefkianakis, Xinyu Zhang and Kyu-Han Kim From Legacy to Gbps Wi-Fi 1999-2003 2009 What is new in 802.11ac? 2013 Legacy
More informationOn the Scalability of Hierarchical Ad Hoc Wireless Networks
On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical
More informationDelivering Voice over IEEE WLAN Networks
Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet
More informationITM542 Spring 2004 Feasibility Study of a Wireless LAN network With-VoIP at IIT Rice campus Ninad Narkhede Masaaki Yana Saturday, 1 May 2004
ITM542 Spring 2004 Feasibility Study of a Wireless LAN network With-VoIP at IIT Rice campus Ninad Narkhede Masaaki Yana Saturday, 1 May 2004 ABSTRACT Wireless technology has gained popularity in enterprises
More informationOver-The-Top (OTT) Aggregation Solutions
Over-The-Top (OTT) Aggregation Solutions Omkar Dharmadhikari, Wireless Architect odharmadhikari@cablelabscom CableLabs February 12, 2019 Agenda Introduction Why aggregation is important? Traditional Aggregation
More informationMulti-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationCARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang
CARA: Collision-Aware Rate Adaptation for IEEE 802.11 WLANs Presented by Eric Wang 1 Outline Introduction Related Work Preliminaries CARA Performance Evaluation Conclusion and Future Work 2 Basic CSMA/CA
More informationCENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data Path
CENTAUR: Realizing the Full Potential of Centralized WLANs through a Hybrid Data Path Vivek Shrivastava, Nabeel Ahmed, Shravan Rayanchu Suman Banerjee, Srinivasan Keshav, Konstantina Papagiannaki, Arunesh
More informationNovember 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.
IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:
More informationMedium Access Control Sublayer
Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More informationEnterprise Mobility with Smarter Wi-Fi
Enterprise Mobility with Smarter Wi-Fi Wi-Fi as Ubiquitous Utility to access your Data Martin Šmrha Product Manager, DNS Agenda 1. Introducing Ruckus 2. The Issues with WiFi 3. Technologies 4. Products
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-9 Wireless Fall 1389 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are obtained
More informationBIGAP. Seamless Handover in High Performance Enterprise IEEE Networks. Anatolij Zubow, S. Zehl, A. Wolisz Technical University Berlin, Germany
BIGAP Seamless Handover in High Performance Enterprise IEEE 802.11 Networks Anatolij Zubow, S. Zehl, A. Wolisz Technical University Berlin, Germany Outline Motivation, System Model, Applications, Design
More informationRouting: Collection Tree Protocol. Original slides by Omprakash Gnawal
Routing: Collection Tree Protocol Original slides by Omprakash Gnawal Collection Anycast route to the sink(s) collects data from the network to a small number of sinks network primitive for other protocols
More informationAttack & Defense in Wireless Networks
Attack & Defense in Wireless Networks John M. Shea April 22, 2008 Overview Wireless networks fundamentals vulnerabilities WING testbed Demonstration of Denial-of-Service Attack and Defense Classification:
More informationMSIT 413: Wireless Technologies Week 8
MSIT 413: Wireless Technologies Week 8 Michael L. Honig Department of EECS Northwestern University November 2017 The Multiple Access Problem How can multiple mobiles access (communicate with) the same
More informationPerformance anomaly of b
Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel
More informationInvestigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet
More informationEtiquette protocol for Ultra Low Power Operation in Sensor Networks
Etiquette protocol for Ultra Low Power Operation in Sensor Networks Samir Goel and Tomasz Imielinski {gsamir, imielins}@cs.rutgers.edu DataMan Lab, Department of Computer Science Acknowledgement: Prof.
More informationECE 598HH: Special Topics in Wireless Networks and Mobile Systems
ECE 598HH: Special Topics in Wireless Networks and Mobile Systems Lecture 21: Opportunistic Routing Haitham Hassanieh *These slides are courtesy of Dina Katabi 1 Lecture Outline Single Path Routing Opportunistic
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More information. 14 Byte for Acks. Due to this fact, the overhead is more relevant if the data contained in packets is sent to high rates:
QoS in IEEE 802.11 Issues Some issues are important for quality of service: the first one mentioned is the difference of performances expired by nodes based on their position in the network. Indeed, considering
More informationReview. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD
Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches
More information